بدائل البحث:
junction » function (توسيع البحث), functions (توسيع البحث)
functional » function (توسيع البحث)
junction » function (توسيع البحث), functions (توسيع البحث)
functional » function (توسيع البحث)
-
1
Using machine learning algorithm for detection of cyber-attacks in cyber physical systems
منشور في 2022"…In addition, the framework outperforms conventional detection algorithms in words of detection rate, the rate of the false positive, and calculation time, respectively.…"
احصل على النص الكامل
احصل على النص الكامل
-
2
New enumeration algorithm for regular boolean functions
منشور في 2018"…After proving this equivalence, this paper introduces a novel data structure that may, with further tweaking, enable faster enumeration algorithms for both regular Boolean functions and all-capacities knapsack problem instances.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
3
Improved Transportation Model with Internet of Things Using Artificial Intelligence Algorithm
منشور في 2023"…<p dir="ltr">In this paper, the application of transportation systems in real-time traffic conditions is evaluated with data handling representations. The proposed method is designed in such a way as to detect the number of loads that are present in a vehicle where functionality tasks are computed in the system. …"
-
4
Unsupervised outlier detection in multidimensional data
منشور في 2022"…<p>Detection and removal of outliers in a dataset is a fundamental preprocessing task without which the analysis of the data can be misleading. …"
-
5
A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method
منشور في 2022"…Due to a limited training dataset, an ML-based IDS generates a higher false detection ratio and encounters data imbalance issues. …"
-
6
Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach
منشور في 2006"…Several algorithms have been proposed in the literature for synthesis of multiple valued logic functions. …"
احصل على النص الكامل
احصل على النص الكامل
article -
7
A neural networks algorithm for data path synthesis
منشور في 2003"…This paper presents a deterministic parallel algorithm to solve the data path allocation problem in high-level synthesis. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
8
Distributed dimension reduction algorithms for widely dispersed data
منشور في 2002"…It runs in linear time and requires very little data transmission. A series of experiments is conducted to gauge how the algorithm’s emphasis on minimal data transmission affects solution quality. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
9
Android Malware Detection Using Machine Learning
منشور في 2024"…Detecting and preventing malware is crucial for several reasons, including the security of personal information, data loss and tampering, system disruptions, financial losses, and reputation damage. …"
احصل على النص الكامل
article -
10
Properties of simulated annealing and genetic algorithms for mapping data to multicomputers
منشور في 1997"…We experimentally analyze some properties of simulated annealing algorithms (SA) and genetic algorithms (GA) for mapping data to multicomputers. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
11
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
منشور في 2022"…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …"
احصل على النص الكامل
-
12
Use of Data Mining Techniques to Detect Fraud in Procurement Sector
منشور في 2022"…The method used in this research is a classification of models and algorithms used in data mining. All techniques also will be studied; they include clustering, tracking patterns, classifications and outlier detection. …"
احصل على النص الكامل
-
13
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
منشور في 2024"…Then, the DRF optimization algorithm is applied to optimally tune the features required for accurate intrusion detection and classification. …"
-
14
-
15
Novel Peak Detection Algorithms for Pileup Minimization in Gamma Ray Spectroscopy
منشور في 2006"…Gamma pulses from a 3" Na(TI) scintillation detector were captured as single and double pulses for the purpose of testing the peak detection algorithms. The pulse classification technique was tested successfully on a TMS320C6000 high performance floating-point processor yielding a reduction of the execution time to 2 msec…"
احصل على النص الكامل
احصل على النص الكامل
article -
16
An image processing and genetic algorithm-based approach for the detection of melanoma in patients
منشور في 2018"…The second phase classifies lesions using a Genetic Algorithm. Our technique shows a significant improvement over other well-known algorithms and proves to be more stable on both training and testing data.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
17
-
18
Application of Machine Learning Algorithms to Enhance Money Laundering and Financial Crime Detection
منشور في 2011"…In order to analyze the performance of machine learning algorithms, data was provided by a bank to be used for educational purposes and shall remain undisclosed. …"
احصل على النص الكامل
-
19
-
20
Genetic and heuristic algorithms for regrouping service sites. (c2000)
منشور في 2000احصل على النص الكامل
احصل على النص الكامل
masterThesis